EMC Documentum D2 version 4.5 and EMC Documentum D2 version 4.6 has a DQL Injection Vulnerability that could potentially be exploited by malicious users to compromise the affected system. An authenticated low-privileged attacker could potentially exploit this vulnerability to access information, modify data or disrupt services by causing execution of arbitrary DQL commands on the application.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/540060/30/0/threaded | Third Party Advisory |
http://www.securityfocus.com/bid/95828 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037733 | |
http://www.securityfocus.com/archive/1/540060/30/0/threaded | Third Party Advisory |
http://www.securityfocus.com/bid/95828 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037733 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/540060/30/0/threaded - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/95828 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037733 - |
Information
Published : 2017-02-03 07:59
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9873
Mitre link : CVE-2016-9873
CVE.ORG link : CVE-2016-9873
JSON object : View
Products Affected
emc
- documentum_d2
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')